Subscribe to Email Updates

Subscribe

All about Virtualization and Cloud Security | Recent Articles:

Linux and Container Security: Removing module dependencies

Bitdefender recently announced GravityZone Security for Containers, expanding our cloud workload security (CWS) by offering run-time support for containers and infrastructures with Linux kernel module (LKM) independence for the Bitdefender technology.

Read More

Five Myths About Preventing Cyber Security Threats

Cyber security for small and mid-sized businesses (SMBs) is a particularly daunting challenge. These companies face many of the same cyber security threats that the largest global enterprises deal with—but often with a fraction of the resources. Aside from the obvious disadvantages smaller organizations face, there are also a number of misconceptions about security that can get in the way of better protection.

Read More

Combatting Ransomware as a Service (RaaS)

Aug 19 by Andrei Pisau

Named by many as the “cyber-attack of the year,” the recent Colonial Pipeline ransomware incident caused more than just business disruption - it inflicted considerable economical damage, reminding us how fragile our digital infrastructure is.

Read More

How container workloads are changing the future of cybersecurity

The use of containers to increase speed of deployment and portability for modern applications is growing rapidly. Now part of the standard architecture for cloud-native businesses, Gartner predicts that, by 2025, 85 percent of organizations will run containers in production, up from less than 30 percent in 2020.

Read More

Using the MITRE ATT&CK™ Framework to Test Your Systems

Aug 10 by Andrei Pisau

In recent years, no framework has become more prevalent than MITRE ATT&CK™, the acronym standing for Adversarial Tactics, Techniques, and Common Knowledge. Why? Because it’s one of the most complete, complex and realistic cybersecurity models - and it’s constantly improving.

Read More

Expanding security support for Azure VMware Solution

Aug 09 by Martin Zugec

Azure VMware Solution (AVS) is designed, built, and supported by Microsoft and provides customers with a private cloud of hosted vSphere clusters, cloud certified by VMware. AVS enables customers to seamlessly extend or migrate their VMware workloads to Azure without the cost of re-architecting applications with a set of familiar VMware technologies and tools – including vSphere, vSAN, and NSX-T. 

Read More

2021 Gartner® Market Guide for Cloud Workload Protection Platforms | Bitdefender’s key takeaways from the report

Protection requirements for cloud workloads continue to grow as organizations accelerate their adoption of containers and host an ever-increasing number of workloads in hybrid and multi-cloud architectures. Cloud Workload Protection Platforms (CWPP) are critical to protect these workloads from cyberattack and provide security teams with visibility into, and control of, cloud-based infrastructure and applications.

Read More

New U.S. Government Website Provides Ransomware Resources for Organizations

Aug 03 by Bob Violino

The potential dangers of ransomware are top of mind for cyber security and IT leaders around the world. The threat of these attacks continues to rise with no organization completely safe. Ransomware attacks have been reported by businesses of all sizes and vertical industries.

Read More

Deep dive into a FIN8 attack – A forensic investigation

Jul 27 by Martin Zugec

During a recent investigation, our researchers encountered a new version of the BADHATCH malware used by the well-known threat actor, FIN8. We previously reported that FIN8 was working on a new version of the BADHATCH malware - and this recent attack supports our findings and conclusions. FIN8 is known for taking extended breaks to improve their tactics, techniques, and procedures (TTPs) which increases their success rate. With each new version of their toolkit, they start with small tests on a limited pool of victims before launching a full-scale attack.

Read More

The Growing Importance of Cloud Workload Security

Jul 22 by Bob Violino
  • A growing number of organizations are increasing their use of the cloud.

  • These workloads, including databases, transactions, and analytics, are vital to business operations.

  • Cloud workloads are different from regular endpoints which is why security teams need to deploy platforms specifically designed to protect these resources.

Read More

Are you ready for the post-spam era?

Feb 22 by Adrian Miron

Augment your email security solution for today’s challenges.

Read More

Bitdefender 2020 Business Threat Landscape Report Reveals New Challenges for 2021

Nov 03 by Liviu Arsene
  • More attacks aimed at exploiting unpatched year-old vulnerabilities
  • An increase in stealth/covert execution tactics
  • APT-hackers-for-hire becoming the new norm
Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets

Posts by Month